NGCE - Network Graphs for Computer Epidemiologists

Graphs are useful data structures capable of efficiently representing a variety of technological and social networks. They are therefore utilized in simulation-based studies of new algorithms and protocols. Inspired by the popular tgff (Task Graphs For Free) toolkit, which creates task graphs for embedded systems, we present the ngce, an easy to use graph generator that produces structures for the study of the propagation of viral agents in complex computer networks. Designated track: Computer Security

[1]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[2]  Jasmin Leveille,et al.  Epidemic Spreading in Technological Networks , 2002 .

[3]  Anukool Lakhina,et al.  BRITE: Universal Topology Generation from a User''s Perspective , 2001 .

[4]  Ibrahim Matta,et al.  BRITE: an approach to universal topology generation , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[5]  Donald F. Towsley,et al.  Monitoring and early warning for internet worms , 2003, CCS '03.

[6]  S. Bornholdt,et al.  Scale-free topology of e-mail networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[7]  Alessandro Vespignani,et al.  Epidemic spreading in scale-free networks. , 2000, Physical review letters.

[8]  Weibo Gong,et al.  Email Virus Propagation Modeling and Analysis , 2003 .

[9]  Satu Elisa Virtanen,et al.  PROPERTIES OF NONUNIFORM RANDOM GRAPH MODELS , 2003 .

[10]  Ibrahim Matta,et al.  On the origin of power laws in Internet topologies , 2000, CCRV.

[11]  Ellen W. Zegura,et al.  How to model an internetwork , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.

[12]  Cohen,et al.  Resilience of the internet to random breakdowns , 2000, Physical review letters.

[13]  Riccardo Scandariato,et al.  An Automated Defense System to Counter Internet Worms , 2003 .

[14]  James R. Eagan,et al.  Extending and enhancing GT-ITM , 2003, MoMeTools '03.

[15]  Walter Willinger,et al.  Network topology generators: degree-based vs. structural , 2002, SIGCOMM '02.

[16]  Sugih Jamin,et al.  Inet-3.0: Internet Topology Generator , 2002 .

[17]  Sally Floyd,et al.  Why we don't know how to simulate the Internet , 1997, WSC '97.

[18]  Lada A. Adamic,et al.  Power-Law Distribution of the World Wide Web , 2000, Science.

[19]  Robert Morris,et al.  Designing a framework for active worm detection on global networks , 2003, First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings..

[20]  Wayne H. Wolf,et al.  TGFF: task graphs for free , 1998, Proceedings of the Sixth International Workshop on Hardware/Software Codesign. (CODES/CASHE'98).

[21]  Albert-László Barabási,et al.  Statistical mechanics of complex networks , 2001, ArXiv.

[22]  Kevin A. Kwiat,et al.  Modeling the spread of active worms , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[23]  Vladimir Batagelj,et al.  Pajek Program for Analysis and Visualization of Large Networks , 2007 .

[24]  Reka Albert,et al.  Mean-field theory for scale-free random networks , 1999 .

[25]  Vern Paxson,et al.  How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.

[26]  Liwu Li,et al.  Java: Data Structures and Programming , 2002, Springer Berlin Heidelberg.

[27]  Steve R. White,et al.  Computers and epidemiology , 1993, IEEE Spectrum.

[28]  S. Bornholdt,et al.  World Wide Web scaling exponent from Simon's 1955 model. , 2000, Physical review. E, Statistical, nonlinear, and soft matter physics.

[29]  Hawoong Jeong,et al.  Modeling the Internet's large-scale topology , 2001, Proceedings of the National Academy of Sciences of the United States of America.

[30]  Christopher R. Palmer,et al.  Generating network topologies that obey power laws , 2000, Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137).

[31]  Ellen W. Zegura,et al.  A quantitative comparison of graph-based models for Internet topology , 1997, TNET.

[32]  Igor Kanovsky,et al.  Models of Web-Like Graphs : Integrated Approach , 2003 .

[33]  Jeffrey O. Kephart,et al.  Measuring and modeling computer virus prevalence , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[34]  Michalis Faloutsos,et al.  On power-law relationships of the Internet topology , 1999, SIGCOMM '99.

[35]  Matthew C. Elder,et al.  On computer viral infection and the effect of immunization , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).

[36]  A. Barabasi,et al.  Scale-free characteristics of random networks: the topology of the world-wide web , 2000 .

[37]  Donald F. Towsley,et al.  Code red worm propagation modeling and analysis , 2002, CCS '02.